2016
DOI: 10.1177/1550147716675627
|View full text |Cite
|
Sign up to set email alerts
|

VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks

Abstract: In the field of wireless sensor networks, the secure range query technique is a challenging issue. In two-tiered wireless sensor networks, a verifiable privacy-preserving range query processing method is proposed that is based on bucket partition, information identity authentication, and check-code fusion. During the data collection process, each sensor node puts its collected data into buckets according to the bucket partition strategy, encrypts the non-empty buckets, generates the check-codes for the empty b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Considering these kinds of attacks, the generalized distance and modular operation range query mechanism is used to improve the security, but also increases the energy consumption. 15 Reference bucket-partitioning and symmetric encryption technology, using hashbased message authentication coding (HMAC) method, to construct code information for checking the integrity verification of query results, and fusion processing of range query according to bucket label, reducing data communication costs. In this article, the bucket-partitioning 15 scheme is used to perform WQuery queries to ensure the privacy of data.…”
Section: Relevant Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering these kinds of attacks, the generalized distance and modular operation range query mechanism is used to improve the security, but also increases the energy consumption. 15 Reference bucket-partitioning and symmetric encryption technology, using hashbased message authentication coding (HMAC) method, to construct code information for checking the integrity verification of query results, and fusion processing of range query according to bucket label, reducing data communication costs. In this article, the bucket-partitioning 15 scheme is used to perform WQuery queries to ensure the privacy of data.…”
Section: Relevant Backgroundmentioning
confidence: 99%
“…This study used original data to conduct a simulation experiment with WQuery on the MATLAB platform and compared it with the SafeQ in literature, 16 the EQ protocol in literature,18 and the VP 2 RQ protocol in literature. 15 The experimental environment for this study consisted of Intel i5-2467M, CPU (quad core, 1.6 GHz), and 8GB memory. The software environment included a Windows 10 operating system and MATLAB.…”
Section: Integrity Analysismentioning
confidence: 99%
“…e energy consumption E qp is E qp � 2(n + 1)(2w − 2)(w + 1) + e t + e r • H hop � 2(n + 1)(2w − 2)(w + 1) + e t + e r . (5) erefore, the total energy consumption E total is…”
Section: (4)mentioning
confidence: 99%
“…Recently, many existing privacy techniques can be employed in sensor network scenarios. For example, a target region transformation technique [2], range query [3][4][5][6], and top-k query [7,8] have been well addressed. However, these schemes are not suitable for cluster-based query processing in wireless sensor networks.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, the two-layer WSN has attracted the attention of researchers because of its simple topology and flexible structure. And a lot of data security query schemes based on the two-layer WSN, such as range query, Top-k query, maximum value query and so on are put forward [5][6][7][8][9][10][11][12]. According to the literature [13], a range query method energy-efficient and privacy-preserving range query (EPRQ) is proposed, which generates a data ciphertext with a symmetric encryption algorithm, encodes the data with 0-1 encoding and hash message authentication encoding, and obtains the query results by comparing the encoding.…”
Section: Introductionmentioning
confidence: 99%